2025-04-15 20:31:50
icscert
PUBLISHED
An unauthenticated attacker can infer the existence of usernames in the system by querying an API.